
    |*&iD                     B    S SK JrJr  S SKJr  S SKJr   " S S\5      rg)    )ABCabstractmethod)VulnerabilityIntelligence)Dictc                   F    \ rS rSrS\4S jr\S\4S j5       rS r	S r
Srg	)
BaseHandler   enrichment_datac                     Xl         g Ndata)selfr
   s     Q/home/kali/cveseeker/services/vulnerability_intelligence/handlers/base_handler.py__init__BaseHandler.__init__   s    #	    vuln_intelligencec                     g r    )r   r   s     r   applyBaseHandler.apply	   s    r   c                     SU 3$ )N$VulnerabilityIntelligenceEnrichment/r   r   sources     r   enrich_source_nameBaseHandler.enrich_source_name   s    5fX>>r   c                     SU S3$ )Nr   z - MITIGATIONr   r   s     r   enrich_source_name_mitigation)BaseHandler.enrich_source_name_mitigation   s    5fX]KKr   r   N)__name__
__module____qualname____firstlineno__r   r   r   r   r   r   r    __static_attributes__r   r   r   r   r      s5    $ $ '@  ?Lr   r   N)abcr   r   !models.vulnerability_intelligencer   typingr   r   r   r   r   <module>r*      s    # G L# Lr   